Is your digital environment protected?

The Security Quickscan is developed with insights from the world’s best hackers and provides you with an excellent first insight into your digital security.
  • Detailed information about possible gaps in your web environment
  • Solutions to improve your online security
 
Security

Security Quickscan

Discover security vulnerabilities in your digital environment

The Security Quickscan analyzes information present on web environments and IT infrastructures. This information is publicly available to everyone, including hackers and malicious users. By increasing your online safety you keep ahead of your competition and gain trust from your customers.



Report features

  • Detailed information about possible gaps in your web environment
  • Solutions to improve your online security
  • Technical terms of your IT infrastructure explained
  • 17 possible security threats checked

Report structure

The scan checks 17 different topics which are discussed in four main categories:

1. Configuration

An insecure configuration can lead to vulnerabilities that are accessible to anyone with an internet connection.
  • Clickjacking
    Clickjacking can occur when a website allows it to be embedded within other websites. This allows an attacker to deceive users into performing actions on the embedded website without the user's knowledge.
  • Shared webhosting
    In a shared infrastructure multiple applications are hosted on the same server. When one application is compromised, other applications are more vulnerable as well.
  • Version information
    An attacker can use knowledge about the version and type of a webserver to find vulnerabilities more easily.

2. Connection

An insecure connection to your website may allow attackers to intercept and manipulate (sensitive) communications.
  • HTTPS
    HTTPS makes sure that data that is sent to and from the webserver is encrypted. This makes it more difficult for an attacker to intercept sensitive content.
  • SLLv2
    SSL v2 is an outdated protocol used to encrypt communications between a client and a server. It should no longer be used, since it contains a number of security flaws.
  • SLLv3
    SSL v3 is an outdated protocol used to encrypt communications between a client and a server. It should no longer be used, since it contains a number of security flaws.
  • TLS1.2
    The most secure version of the SSL/TLS protocol is TLS version 1.2. This is the only version of the SSL/TLS protocol which allows mitigation of all currently known security weaknesses in SSL.
  • Wildcard certificate
    The use of wildcard certificates poses an additional security risk. Should the private key associated with the certificate be compromised, an attacker can impersonate any system within the wildcard’s scope.
  • Expired certificate
    An expired certificate prevents a user’s browser from automatically authenticating with the server. Each time a user visits the site, the user is presented with a warning.
  • Untrusted certificate
    The certificate of the application is not signed by a trusted third party. Each time a user visits the site, the user is presented with a warning.
  • Heartbleed
    Heartbleed is an attack that makes it possible for malicious users to decrypt all communication between a user and a webserver.

3. Administrative interfaces

Obsolete files that are still available via your website can contain technical and sensitive information.
  • Telnet
    Telnet is a protocol that allows you to remotely administrate a server. It is a best practice to make administrative interfaces available only over out-of-band channels.
  • FTP
    The File Transfer Protocol is a protocol that allows you to send and receive files from a server. It is a best practice to make administrative interfaces available only over out-of-band channels.
  • RDP
    Using the Remote Desktop Protocol it is possible to log in remotely to another machine. It is a best practice to make administrative interfaces available only over out-of-band channels.
  • SSH
    SSH is a protocol that allows you to remotely administrate a server. It is a best practice to make administrative interfaces available only over out-of-band channels.

4. Files

Obsolete files that are still available via your website can contain technical and sensitive information
  • Obsolete files
    Obsolete files are files that are no longer needed after an installation, and can contain (technical) information usable by an attacker.
  • Robots.txt
    A robots.txt file tells a crawler which pages should and should not be indexed. An attacker can gain useful information on where sensitive information might be available using this file.

Good to know

Did you know that our risk experts can help you protect your digital environment as well? Take a look at their services and see how their expertise can help protect your business online.

Check out our other reports

  • Risk Reports: get helpful insights into 125 globally reported risks that could affect your company.
  • Strategy Reports: get useful facts that will help you increase your revenue growth, operating margin, and asset efficiency.
  • Patent Reports: benchmark your company against your industry or a selected group of peers, and see where your competitors want to innovate.

Security Quickscan

Availability: In stock

Excl. VAT $59.00 Incl. Tax: $71.39
Enter the URL of your website:
- The domain of your email needs to correspond with the web page
- Redirects of the entered domain are not taken into consideration
Excl. VAT $59.00 Incl. Tax: $71.39
  • Average download time = 1 minute
  • Security reports are customized, data and insight driven
  • Based on the insights of the five time Cyberlympics winners / world’s best hackers
  • 100% money back guarantee